General
-
Target
mixsix_20211019-085221
-
Size
284KB
-
Sample
211019-ks1kasgdaq
-
MD5
6e97e25e5ece6270a734c318350bf6ed
-
SHA1
d9eb51ef1682e28c4d015c24d671628b15615028
-
SHA256
134ffa500f97afbc66a09a02bdb126e767df9296cfd00b747fc6eece6a73d792
-
SHA512
2691f3961f7d0216805f53012e311a1e6657bbd497cac9046af62545126f133557e83b44ac7432d68b0c5a955b4ad6f526dcefdcaf1bf00563e4922f2a6dd5a7
Static task
static1
Behavioral task
behavioral1
Sample
mixsix_20211019-085221.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
mixsix_20211019-085221.exe
Resource
win10-en-20210920
Malware Config
Extracted
arkei
Default
http://game2030.link/ggate.php
Targets
-
-
Target
mixsix_20211019-085221
-
Size
284KB
-
MD5
6e97e25e5ece6270a734c318350bf6ed
-
SHA1
d9eb51ef1682e28c4d015c24d671628b15615028
-
SHA256
134ffa500f97afbc66a09a02bdb126e767df9296cfd00b747fc6eece6a73d792
-
SHA512
2691f3961f7d0216805f53012e311a1e6657bbd497cac9046af62545126f133557e83b44ac7432d68b0c5a955b4ad6f526dcefdcaf1bf00563e4922f2a6dd5a7
-
Arkei Stealer Payload
-
Downloads MZ/PE file
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-